A Shibboleth SP vulnerability has been confirmed in the OpenSAML libraries affecting non-XML signature features in the Redirect and POST-SimpleSign bindings. This flaw exposes Shibboleth SP to critical SSO forgery/impersonation attacks.   

If you use RapidConnect or OpenID Connect (OIDC) for your AAF service, you are not affected by this vulnerability.  
 

Affected versions of Shibboleth SP: 3.5 or older 

Recommendation 

Linux users:   

  • This is typically achieved by using your package manager, i.e. yum update opensaml or yum update shibboleth. The shibd process will require a restart after the upgrade.   

  • The OpenSAML version should be omitted in shibd logs (should be at least 3.3.1 to indicate the fix is applied)e.g.  
    2025-03-16 11:30:44 INFO OpenSAML.Config : opensaml 3.3.1 library initialization complete  

Windows users: 

  • Upgrade Shibboleth SP to 3.5.0.1 or newer  

Should you experience any difficulties, please contact AAF Support 
  
Email: [email protected] | Web: support.aaf.edu.au